ReClassNET / ReClass.NET-MemoryPipePluginLinks
A ReClass.NET plugin which allows direct memory access via dll injection.
☆25Updated 5 years ago
Alternatives and similar repositories for ReClass.NET-MemoryPipePlugin
Users that are interested in ReClass.NET-MemoryPipePlugin are comparing it to the libraries listed below
Sorting:
- A ReClass.NET plugin which uses the process handles of an other process to access the data of the target.☆29Updated 4 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆122Updated 8 years ago
- PoC: DX11 overlay over DWM☆155Updated 5 years ago
- ☆184Updated 6 years ago
- driver manual mapper☆27Updated 5 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Updated 6 years ago
- Just a thing i am trying to do, testing some things out and so on. This is for a game called csgo and basically are for people how knows …☆122Updated 4 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆94Updated 5 years ago
- Just my first IOCTL try☆75Updated 5 years ago
- ☆171Updated 8 years ago
- Generate SDKs from Unreal Engine games (UE1 - 4 supported).☆79Updated 7 years ago
- ☆144Updated 4 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆115Updated 7 years ago
- A customizable process dumper.☆143Updated 6 years ago
- Some psuedo snippets from BattlEye's BEDaisy.sys loaded on Rainbow Six: Siege.☆127Updated 3 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆146Updated 7 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆161Updated 5 years ago
- Kernel Lazy Importer☆127Updated last year
- Obfuscates all RTTI (Run-time type information) inside a binary☆199Updated 8 years ago
- Invoke functions with a spoofed return address. For 32-bit Windows binaries. Supports __fastcall, __thiscall, __stdcall and __cdecl calli…☆175Updated 2 years ago
- 09/2021 reversal of EasyAntiCheat driver☆226Updated 3 years ago
- External mid-function hooking method to retrieve register data☆92Updated 7 years ago
- ☆75Updated 5 years ago
- A kernelmode driver swapping a .data pointer in the kernel to perform communication between the kernel and usermode.☆144Updated 5 years ago
- BattlEye compatible injector, done completely from user-mode.☆54Updated 2 years ago
- ☆42Updated 6 years ago
- driver mapper / capcom wrapper☆225Updated 6 years ago
- Kernel mode bypass for BattlEye, EAC☆187Updated 2 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆333Updated 5 years ago
- Vectored Exception Handling Hooking Class☆165Updated 6 years ago